Symmetric Key-Based Lightweight Authentication Protocols for RFID Security

被引:2
|
作者
Rajaguru, K. [1 ]
Hansdah, R. C. [1 ]
机构
[1] Indian Inst Sci, Dept Comp Sci & Automat, Bangalore 560012, Karnataka, India
关键词
PRIVACY; SYSTEMS;
D O I
10.1109/WAINA.2018.00133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) is being used in many industries from inventory tracking to human implants. However, there are many security issues in RFID systems. Many attacks like privacy related attacks, eavesdropping, replay attack, man-in-the-middle attack, de-synchronization attack, etc. are possible in RFID systems. Due to these security problems, an adversary can get important information which can be used to track the location of a person, steal information, etc. Many researchers have proposed protocols to cater for security. However, there are several drawbacks in existing protocols. For example, they do not support both active and passive tags. In many protocols, reader is not authenticated by server. Many protocols cannot be implemented in practice due to limitations in RFID tag computing ability. This motivated us to explore new protocols which can satisfy all security requirements of authentication protocols for RFID security at low cost. In this paper, we propose a suite of lightweight authentication protocols for RFID security which provide security against all known attacks. We have compared the security provided by the proposed protocols with those of the existing protocols, and shown that the proposed protocols meet most of the security requirements of authentication protocols for RFID security. Essentially, we propose two protocols with tag anonymity as an option. The first protocol ensures all security requirements at low cost. In the second and improved protocol, communication between server and reader is greatly reduced.
引用
收藏
页码:488 / 495
页数:8
相关论文
共 50 条
  • [1] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [2] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
  • [3] On The Performance Bound of Structured Key-Based RFID Authentication
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    Lai, Ten H.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2019,
  • [4] SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
    Alzahrani, Bander A.
    Barnawi, Ahmed
    Albarakati, Abdullah
    Irshad, Azeem
    Khan, Muhammad Asghar
    Chaudhry, Shehzad Ashraf
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [5] On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems
    Safkhani, Masoumeh
    Bagheri, Nasour
    Shariat, Mahyar
    [J]. FUTURE INTERNET, 2018, 10 (09)
  • [6] Security analysis of two ultra-lightweight RFID authentication protocols
    Li, Tieyan
    Wang, Guilin
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
  • [7] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [8] The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security
    Shi, Zhicai
    Zhang, Xiaomei
    Liu, Jin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [9] A Lightweight RFID Authentication Protocol using Step by step Symmetric Key Change
    Kim, Kyoungyoul
    Chung, Kyungho
    Shin, Juseok
    Kang, Hyunwoo
    Oh, Sejin
    Han, Chunho
    Ahn, Kwangseon
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 853 - 854
  • [10] Security of lightweight mutual authentication protocols
    Yu-Ju Tu
    Gaurav Kapoor
    Selwyn Piramuthu
    [J]. The Journal of Supercomputing, 2021, 77 : 4565 - 4581